Over the past 10 years, Data Domain systems have helped numerous enterprise customers transform their backup, archiving and disaster recovery with high-speed deduplication. Today, we are excited to announce the new Data Domain DD2200 deduplication storage system, which provides no-compromise data protection for midmarket customers.
With the new DD2200 EMC midmarket customers can now:
Backup 36 TB in under 8 hours with 4.7 TB/hr ingest performance via DD Boost
Protect up to 860 TB logical capacity in 2U with up to 17.2 TB usable capacity
Simultaneously support up to 60 backup/archive streams
What all of this boils down to is an affordable protection storage system with enterprise-class benefits – optimized for small to midsize enterprises. This means midmarket customers can now:
Reduce data protection storage requirements by 10 to 30x
Object storage is the standard for managing today’s explosive growth in unstructured content. EMC knows this best – pioneering object storage over a decade ago with the release of EMC Centera, the enduring leader in compliance archiving. In 2008, EMC broadened its portfolio in object storage with the introduction of EMC Atmos — an industry leader for cloud storage and next-generation Web, mobile and REST-based applications. However, object storage is more than just scalable storage. What truly differentiates object storage is that its core strengths of simplicity, scalability and efficiency can be optimized for specific use cases – and that’s exactly what today’s Atmos announcement brings to the table.
The BYOD movement continues to gain momentum. As such, consumer devices are invading the enterprise. This freedom is liberating for workers but potentially disastrous for IT. To combat the risks introduced by BYOD, IT has no choice but to arm themselves with enterprise-grade security and control to mitigate potential data leakage.
Today, EMC is excited to announce Syncplicity Enterprise Edition (EE), an enterprise-scale, cloud-based file sharing solution that blends two ends of the spectrum — consumer usability with true enterprise security and control.
The world we live in today is the result of an evolution that started back in they days of the “Moonlight Maze” attacks in the late 1990s. What the security community has come to realize over the past decade is that the advanced threat is not just a phenomenon isolated to critical government systems, nor is it simply a matter of “one and done” attacks that have a single intent. In our highly connected world, nearly any company can be the focus of sophisticated, determined attacks, whether for the digital information they possess, or as a stepping stone to another target somewhere else in their digital supply chain. This is why we’ve created the RSA Next Generation Security Operations Center (SOC) design and implementation services approach.
The opinions and interests expressed on Dell EMC employee blogs are the employees' own and do not necessarily represent Dell EMC's positions, strategies or views. Dell EMC makes no representation or warranties about employee blogs or the accuracy or reliability of such blogs. When you access employee blogs, even though they may contain the Dell EMC logo and content regarding Dell EMC products and services, employee blogs are independent of Dell EMC and Dell EMC does not control their content or operation. In addition, a link to a blog does not mean that EMC endorses that blog or has responsibility for its content or use.